General
-
Target
0d7b7607847585b60b3e7c788720990aa8e88fb53beba9c46e0094d6c5aec0b8.exe
-
Size
120KB
-
Sample
241211-claras1jgs
-
MD5
8305270161732002036310fdc2b59dba
-
SHA1
c3f2653b1fbb849158cad1add393900e5b82587e
-
SHA256
0d7b7607847585b60b3e7c788720990aa8e88fb53beba9c46e0094d6c5aec0b8
-
SHA512
807cf07539f353b050837ab59bca25c11543c892ee84acb1cab113881631556a0177bc54be3fc7b469eb7a3cdf3d465994a5e811f50ef2e3bd3b53cdf514eb67
-
SSDEEP
1536:weQ64QvDr7hdNp/Dm2zrmudnIAXZRyPGLfXiH9izYA3zhmqEPuDOyT6REf:wV6Dv/7hdjm2zrmsIsyuLaP2DPmCf
Static task
static1
Behavioral task
behavioral1
Sample
0d7b7607847585b60b3e7c788720990aa8e88fb53beba9c46e0094d6c5aec0b8.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0d7b7607847585b60b3e7c788720990aa8e88fb53beba9c46e0094d6c5aec0b8.exe
-
Size
120KB
-
MD5
8305270161732002036310fdc2b59dba
-
SHA1
c3f2653b1fbb849158cad1add393900e5b82587e
-
SHA256
0d7b7607847585b60b3e7c788720990aa8e88fb53beba9c46e0094d6c5aec0b8
-
SHA512
807cf07539f353b050837ab59bca25c11543c892ee84acb1cab113881631556a0177bc54be3fc7b469eb7a3cdf3d465994a5e811f50ef2e3bd3b53cdf514eb67
-
SSDEEP
1536:weQ64QvDr7hdNp/Dm2zrmudnIAXZRyPGLfXiH9izYA3zhmqEPuDOyT6REf:wV6Dv/7hdjm2zrmsIsyuLaP2DPmCf
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5